establishingsecurity / trustzone-rootkitLinks
TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.
☆14Updated 3 years ago
Alternatives and similar repositories for trustzone-rootkit
Users that are interested in trustzone-rootkit are comparing it to the libraries listed below
Sorting:
- ☆14Updated 2 years ago
- IDA (sort of) headless☆25Updated last year
- ☆18Updated 3 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆30Updated 3 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆26Updated 6 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated last month
- ☆35Updated 4 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- Investigating the bug behind CVE-2021-26708☆27Updated 4 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- r2con 2020 CTF kernel challenge☆12Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- ☆33Updated 2 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated 10 months ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆23Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- PoC for House of Husk Exploit☆13Updated 5 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 5 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- Full chain Chrome 71.0.3578.98 exploit☆18Updated 4 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆29Updated 2 years ago
- CTF writeups☆9Updated 5 years ago
- binary ninja related code☆35Updated 3 months ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆17Updated 2 years ago